CHAPTER 1 INTRODUCTION
|
|
|
- Oswald Owen
- 10 years ago
- Views:
Transcription
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1]. In other words, service discovery is an action of finding a service provider for the requested service. The user may access and use the service when the location of the demanded service (typically the address of the service provider) is retrieved. The service discovery protocols also provide features to spontaneously lookup services with a low communication overhead. There are some elements participate in the service discovery protocol. Each service discovery protocol consists of at least two participating elements which are client and server. The client also called as a user is an entity that interested in finding and using a service, while server is the entity that offers the service. However, it is common to find third participating entity within service discovery protocol. This is due to protocol may use service repositories to facilitate service mappings. The third entity is named as directory which act as a node in the network that hosts partially or
2 2 entirely the service description information [1]. The directory also known as broker, central, resolver, and server depends on situation. The most popular service discovery protocols that addressing the service discovery are Service Location Protocol (SLP), Jini, Bluetooth Service Discovery Protocol (Bluetooth SDP), Salutation, and Universal Plug and Play (UPnP) Service Location Protocol (SLP) The Service Location Protocol (SLP) is developed by the IETF (Internet Engineering Task Force) working group. The aim of SLP is to be a vendorindependent standard. SLP is designed for TCP/IP networks and is scalable up to large enterprise networks. The SLP architecture consists of three main components which are User Agents (UA), Service Agents (SA), and Directory Agents (DA). The UA is on behalf of the client or user that perform service discovery. The SA on behalf of service advertises the location and characteristics of services, while DA acts as data storage. It collects service addresses and information received from SA in their database and respond to the service requestor which is UA.
3 3 Figure 1.1 : Service Location Protocol with Directory Agent Figure 1.1 shows the interactions between three agents (user agent, service agent, and directory agent). It starts whenever a new service connects to the networks, the SA contacts the DA to advertise its existence. This process named as Service Registration process. After sometimes, whenever a user demand and request for a certain service, the UA make queries for the available services in the network from the DA. The process of querying for a service is called as Service Request. When the user receives the address and characteristics of the demanded service, it may finally utilize the service. However, a client of DA (UA or SA) must discover the existence of the DA before they are able to contact the DA. There are three methods for DA discovery which are static, active, and passive discovery. In static discovery, SLP agents obtain the address of DAs through the Dynamic Host Configuration Protocol (DHCP). DHCP servers distribute the addresses of DAs to hosts that request them. In active discovery, UAs and SAs send service requests to the SLP multicast group address ( ). A DA listening on this address will eventually receive a service request and directly respond to the requesting agent via unicast. With the passive discovery, DAs are periodically sending out multicast advertisements for their services. UAs and SAs then learn the DA address from the received advertisements and are able to contact the DA themselves via unicast [2].
4 4 Figure 1.2 : Service Location Protocol without Directory Agent In fact, the usage of DA is not mandatory. It is used especially in a large network with many services. So that, it allows services to be categorized into different groups or scopes. Therefore, for a small network like home or car network, it is more effective to deploy SLP without using the DA which the architecture is shown in Figure 1.2. In this case, UA is repeatedly send out their Service Request to the SLP multicast address. The SAs listen for the multicast request and advertise the requested service to the UA. They will send unicast response to the UA. Furthermore, SAs will multicast an announcement of their existence periodically to the UA, so that the UA can learn about the existence of new services.
5 Jini Jini technology is an extension of the programming language Java. It has been developed by Sun Microsystems. The concept of Jini is how devices connect with each other in order to form a simple ad hoc network and how these devices provide services to other devices in the network [2]. Each Jini device is assumed to have a Java Virtual Machine (JVM) running on it. Without JVM, Jini technology cannot be implemented in the device. The Jini architecture principle is similar to the SLP. The process of devices and applications register with a Jini network is called as Discovery and Join process. In order to join a Jini network, a device or application places itself into the Lookup Table on a lookup server, which is a database for all services on the network. This concept is similar to the DA in SLP Bluetooth Service Discovery Protocol (SDP) Bluetooth is a new short range wireless transmission technology. The Bluetooth protocol stack contains the Service Discovery Protocol (SDP), which is used to locate services provided by or available via a Bluetooth device. It is based on Piano platform by Motorola and has been modified to suit the dynamic nature of ad hoc communications [2]. With Bluetooth, it addresses service discovery specifically for this environment and focuses on discovering services. It supports the inquiries such as searching for services by service attributes, searching for services by service type, and service browsing without a prior knowledge of the service characteristic. The
6 6 SDP does not include functionality for accessing services. Once services are discovered with SDP, the services can be selected, accessed, and used by mechanisms out of the scope of the SDP. It means, there is no need service mapping within the Bluetooth SDP Salutation Salutation is another protocol approach to the service discovery. The Salutation has been developed by an open industry consortium which called as the Salutation Consortium [2]. In the Salutation architecture, it consists of Salutation Managers (SLMs). The SLM has functionality of service brokers. Services will register their capabilities with the SLM, while the clients will query the SLM when they need a service. After discovering a desired service, clients are able to request the utilization of the service through the SLM Universal Plug and Play (UPnP) Universal Plug and Play (UPnP) is being developed by an industry consortium which has been found and is lead by Microsoft. It also can be said that it extends the Microsoft s Plug and Play technology to the case where devices are reachable through a TCP/IP network [2]. The UPnP usage is proposed for small office or home computer networks, where it enables peer-to-peer mechanisms for auto-configuration of devices, service discovery, and also for controlling of services. In UPnP, there is no central service register, such as the DA in SLP or the lookup table in Jini. The UPnP uses the Simple Service Discovery Protocol (SSDP) to
7 7 discover services. SSDP uses Hypertext Transfer Protocol (HTTP) over User Datagram Protocol (UDP) and is designed for IP network usage. 1.2 Problem Statement Nowadays, it is quite difficult to find and use any demanded or desired service in an area which is not familiar to the user. Without having any information about server or service provider, it will be more complicated. Usually people need to call the telephone operator to get the service provider s contact number. Others spend their time surfing the Internet in order to get information of the desired service through a numbers of service providers. More time need to be spent for this purpose. In a fast changing environment, where services appear and disappear in an unexpected way, it is crucial to employ a fast and efficient service selection process, which will also not distract the user. By using SDP, it enables users to discover and use proximity services effortlessly in the fastest and most efficient way. Nevertheless, in service discovery, devices may also automatically discover network services including their properties and the services that may advertise their existence in a dynamic way. This will make the SDP is the best way to be used not only the client, but even it eases the service providers to advertise their services.
8 8 1.3 Objectives The objectives of this project are as the follows: i. To implement the Jini technology in a network for the Service Discovery Protocol purpose. ii. To create services and service providers that can be used in Jini technology. iii. To analyze the performance of the Jini technology in a network. 1.4 Scope of Work There are few scopes and limitations in doing this project. The first one is to use Jini technology as the service discovery protocol rather than others. For the implementation, Jini technology is applied during testing process on command prompt and on the Jini technology starter kit. The second limitation of this project is focusing on three entities of the SDP. They are will be client, server, and service provider. The client and service provider need to have an embedded Jini. In this project, it has one client computer and three computers of service providers with three difference service offered. The last one is to check the network performance during Jini technology implementation. However, the limitation is to check the network delay by using the Wireshark Network Protocol Analyzer.
9 9 1.5 Project Report Outline This project report consists of five chapters. The first chapter (chapter 1) provides the introduction to this project and also provides the problem statement, objectives, and scope of the project. Chapter 2 provides pass few years projects which have been done on SDP area. Background of the project including Jini SDP architecture and the way it works are also explained in this chapter. Chapter 3 details on the methodology of SDP using Jini technology. This chapter explains on how to create services using command prompt and how to test the test bed. Delay of the network will be determined through Wireshark. Chapter 4 describes the results and discussion of the project experiments. The results obtained from the Jini Technology starter kit, windows s command prompt, and the Wireshark software. Then, the network performance is calculated as the highlight of the project. Chapter 5 concludes what have been done to complete the project and few numbers of future works are suggested in order to improve the project.
How To Create A Service Discovery Protocol In Java (Java) And Other Networks
International Journal of Computer Research ISSN 1535-6698 Volume 11, Number 1, pp. 1-12 2002 Nova Science Publishers, Inc. PROTOCOLS FOR SERVICE DISCOVERY IN DYNAMIC AND MOBILE NETWORKS Computer and Information
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
Mobile Devices: Server and Management Lesson 05 Service Discovery
Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)
A COMPARISON OF SERVICE DISCOVERY PROTOCOLS AND IMPLEMENTATION OF THE SERVICE LOCATION PROTOCOL
A COMPARISON OF SERVICE DISCOVERY PROTOCOLS AND IMPLEMENTATION OF THE SERVICE LOCATION PROTOCOL Christian Bettstetter and Christoph Renner Technische Universität München (TUM) Institute of Communication
Suitability of existing service discovery protocols for mobile users in an ambient intelligence environment
Suitability of existing service discovery protocols for mobile users in an ambient intelligence environment Davy Preuveneers Department of Computer Science K.U.Leuven Celestijnenlaan 200A B-3001 Leuven,
Automatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
An introduction to Service Discovery Protocols, with a closer view on the Service Location Protocol and Home Audio Video Interoperability
An introduction to Service Discovery Protocols, with a closer view on the Service Location Protocol and Home Audio Video Interoperability Maxim Langebrekke Department of Telematics Norwegian University
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Mapping of Services on Bluetooth Radio Networks
Mapping of s on Bluetooth Radio Networks J. Dunlop and N. Amanquah University of Strathclyde -Department of Electronic and Electrical Engineering, Glasgow G1 1XW, Scotland Ph.: +44 141 5482081, Fax:+44
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Jini Technology Applied to Railway Systems
Jini Technology Applied to Railway Systems Txomin Nieva a, b,, Andreas Fabri b, Abdenbi Benammour a a Institute for computer Communications and Applications (ICA) Communication Systems Dept. (DSC) Swiss
Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.
Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company
Performance Evaluation of Service Discovery Strategies in Ad Hoc Networks
Performance Evaluation of Service Discovery Strategies in Ad Hoc Networks by Honghui Luo A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfilment of the requirements for
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
What communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected]
SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected] Abstract Time Warner Cable is the second largest Cable TV operator in North America
RESOURCE DISCOVERY IN AD HOC NETWORKS
RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR-98-769 August 1998 This project is in part supported by FX Palo Alto Laboratories and
A Distributed Architecture for Remote Service Discovery in Pervasive Computing
A Distributed Architecture for Remote Service Discovery in Pervasive Computing by Farzad Salehi A thesis submitted to the Department of Computer Science in conformity with the requirements for the degree
Research And Implementation For Remote Access Of UPnP
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research And Implementation For Remote Access Of UPnP Gan Xiaojian 1, a,wang Haitao 2, b, Jiang Ying 3, c,
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
UPnP Control Point for Mobile Phones in Residential Networks
1 UPnP Control Point for Mobile Phones in Residential Networks Andreas Häber 1, Frank Reichert 2, and Andreas Fasbender 3 Abstract Together, Ericsson and HiA are studying the role of WiFi-enabled mobile
Support of Multimedia SIP Applications over Proactive MANETs Extension of OLSR for Service Discovery
Support of Multimedia SIP Applications over Proactive MANETs Extension of OLSR for Service Discovery Li Li and Louise Lamont CRC Canada Outline Overview of MANET Service Discovery Schemes OLSR Extension
Investigating Service Discovery, Management and Network Support for Next Generation Object Oriented Services
Investigating Service Discovery, Management and Network Support for Next Generation Object Oriented Services Bilhanan Silverajan, Joona Hartman, Jani Laaksonen Dept. of Information Technology, Tampere
E-Business Technologies for the Future
E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Overview
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
Personal Firewall Default Rules and Components
Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their
Marratech Technology Whitepaper
Marratech Technology Whitepaper Marratech s technology builds on many years of focused R&D and key reference deployments. It has evolved into a market leading platform for Real Time Collaboration (RTC)
Introduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
INTERNET OF THINGS 1
INTERNET OF THINGS 1 OUTLINE Introduction to IoT Technologies Ubiquitous Network Network Management Technologies RFID WSN Embedded Nanotechnology IPv6 UPnP SNMP Challenging Problems Conclusions and Future
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
Product Standard General Interworking: Internet Server
General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Configuring Windows Server Clusters
Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed
Microsoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example
Microsoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example Document ID: 107606 Contents Introduction Prerequisites Requirements Components Used Conventions Wireless
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Configuration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
Using Bonjour Across Subnets
Using Bonjour Across Subnets Version: 1.0 Date: 9/19/06 Author: Geordie Korper Overview This paper discusses methods you can use to provide Bonjour discovery services across subnets. It is intended for
Interoperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
Enhancements to Collaborative Media Streaming with IETF Protocols
Enhancements to Collaborative Media Streaming with IETF Protocols Institute of Operating Systems and Computer Networks Technical University of Braunschweig Dagstuhl Seminar - Content Distribution Infrastructures,
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
The Device Service Bus: A Solution for Embedded Device Integration through Web Services
The Device Service Bus: A Solution for Embedded Device Integration through Web Services Gustavo Medeiros Araújo Federal University of Santa Catarina Informatics and Statistics Department Florianópolis,
Svn.spamsvn110. QuickStart Guide to Authentication. WebTitan Version 5
Svn.spamsvn110 QuickStart Guide to Authentication WebTitan Version 5 Copyright 2014 Copperfasten Technologies. All rights reserved. The product described in this document is furnished under a license agreement
Storage Solutions Overview. Benefits of iscsi Implementation. Abstract
Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Xerox WorkCentre 7755 / 7765 / 7775. System Administrator Guide Guide de l administrateur système Español Português 7755 / 7765 / 7775
Xerox WorkCentre 7755 / 7765 / 7775 Multifunction Printer Xerox WorkCentre 7755 / 7765 / 7775 Guide de l administrateur système Español Português Guía del administrador del sistema Guia de Administração
Installing and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
Simple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Network Layer Support for Service Discovery in Mobile Ad Hoc Networks
Network Layer Support for Service Discovery in Mobile Ad Hoc Networks Ulaş C. Kozat and Leandros Tassiulas Department of Electrical and Computer Engineering and Institute for Systems Research University
Virtualizing Enterprise Desktops and Apps
Course 20694B: Virtualizing Enterprise Desktops and Apps Page 1 of 6 Virtualizing Enterprise Desktops and Apps Course 20694B: 4 days; Instructor-Led Introduction This four-day, hands-on training course
How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7?
KB 150103 How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7? Creation date: 27/05/2013 Last Review: 28/06/2013 Revision number: 2 Document type: How To Security status:
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options
MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003
Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...
IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS
IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS Marietta A. Gittens (Dr. Sadanand Srivastava, Dr. James Gil De Lamadrid) {mgittens, ssrivas, gildelam}@cs.bowiestate.edu
Pre Sales Communications
Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011
Joe Davies Principal Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group June 1, 2011 2011 Microsoft Corporation IPv6 addressing and DNS review IPv6 subnetting
Windows 7 Core Services: Application Experience. Application Information. Background Intelligent Transfer. Base Filtering Engine.
Yegor Hanov EECS710, Fall 2012 Homework Assignment 10/23/12 Assignment 2: Core Windows 7 Services I reviewed the list of active services running on my laptop during normal operation. The list [1] contains
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Microsoft 20694 - Virtualizing Enterprise Desktops and Apps
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20694 - Virtualizing Enterprise Desktops and Apps Length 5 days Price $4169.00 (inc GST) Version B Overview This five-day, hands-on training course is designed
